Patient Confidentiality In A Computerized World Essay

Introduction
Today’s computerized world is the wave of the future throughout the healthcare industry. Computers are becoming the centerpiece of data management, to store medical records and other patient information, for our healthcare professionals. A patient’s medical record is more accessible than it has ever been, providers are finding a difficult time keeping their patient’s records safe and secure. With this information accessible to anyone who has access to these devices, it has become even more important to keep those without a job related need to know or those stealing devices, out of records that they aren’t entitled to see.
The use of laptops and mobile devices for providers have been a key contributor to breaches a across the country. These devices have made working on the go, from home and virtually anywhere possible to those providers that use this technology. This adds a whole new element to safeguard patient privacy when it can’t be controlled in-house. The health care industry needs to focus on providing proper education, use technical safeguards, have physical protection, and administrative tools set up to handle potential threats. Patient confidentiality is being compromised at all-time highs and the problems aren’t going to go away with mobile technology becoming common place throughout the healthcare industry.
Identification of Problem With the healthcare industry changing from paper to electronic medical records there is a rise in breaches throughout the country. In 2003 the number of breaches reported to the Health & Human Services (HHS) was 3,742 cases and in 2012 there were 10,443 cases reported. (HHS) The rise in these numbers translate from the increasing use of mobile devices that providers have come accustomed to use. A study done by Manhattan Research showed that more than eight in 10 physicians in the United States own a smartphone. (Daley) These physicians can access emails and mobile apps to patient records and other documentation. It has increased productivity, response time, and information and communication access by using these kinds of devices.
With these types of devices they can easily get into the wrong hand. Recent HHS analysis of reported breaches indicates that almost 40% of large breaches involve lost or stolen devices. (Lewis) Devices such as mobile phones, laptops, tablets and storage devices provide easy access to patient charts and communication among providers. Many of these providers use these devices at point of care to help treat and document patient contact. These devices hold important patient data and could be compromised when in the wrong hands.
Nature and Dimensions of the Issue Advocate Health Care reported in August 2013 that four unencrypted laptops were stolen from its facility. There were more than 4 million people whose protected health information were compromised. (Mccann) These laptops were stolen from an unmonitored room and had no or little security to prevent unauthorized access. These records had patient names, addresses, dates of birth, Social Security numbers, health insurance data, medical diagnoses and physician names. This is actually the second major breach for Advocate Health Systems when in 2009 had another unencrypted laptop stolen. Each of these cases could have been prevented with proper encrypted devices and secured areas where these devices are accessible.
A Tennessee healthcare firm experienced a security breach when one of its laptops was stolen from an employee’s home. The laptop contained personal information-Social Security numbers, birth dates and names-of 8,000 people who have visited the healthcare provider since 2005. (Globalscape) Although there was security measures taken to secure the information with fingerprint and password protection this information could still be hacked and used. This

Related Documents: Patient Confidentiality In A Computerized World Essay

Paper
Kurt Dayos
HCS/335
August 12, 2013
Rosilyn Nolan
This paper will discuss about the concept of confidentiality and electronic health information. It will also discuss the efforts undertaken to safeguard confidentiality. Additionally, this paper will look at confidentiality and public health. Lastly it will address some of the implications of the current literature surrounding confidentiality.
In 1997, Judi Selig, a secretary for a South Carolina machinery firm, probably did not anticipate…

implication of integrating technology for this purpose. Justify your position.
My position on using technology can have disadvantages and advantages. The main disadvantages would be my concerns with confidential, the risk of breach of client’s confidentiality is much greater. However, the advantage is if the client has a physical disability that prevents them from attending counseling they would be able to receive the help they need. One ethical violation could be to provide services to a minor without…

Instructor: Sonia Pinock
Abstract
While myriad forces are changing the face of contemporary healthcare, one could argue that nothing will change the way nursing is practiced more than current advances in technology. Technology is changing the world at warp speed and nowhere is this more evident than in healthcare settings. This article identifies seven emerging technologies that will change the practice of nursing; three skill sets nurses will need to develop to acquire, use, and integrate these…

be helpful to have a way for people to email questions in ahead of time so answers can be prepared beforehand. This way the panel members can have an idea of what topics to prepare for. You have to keep in mind that you must maintain complete confidentiality when communicating with consumers. The best way to do this is to allow attendees to fill out an index card with their questions and drop them in a box to be pulled and addressed once forum has begun. All persons asking questions will remain anonymous…

communication must be shown to the manager before it is passed on, this is to make sure it is accurate. For example, in a situation where a doctor and a nurse are caring for a patient, the nurse will have to write what procedure the patient needs to undertake. If the nurse writes down the wrong information to the doctor the patient could receive the wrong procedure, wrong medications, and/or the wrong after care which could lead to the patient’s death.
Another example of miscommunication could be at…

to provide material for class discussion.
The authors do not intend to illustrate either effective or ineffective handling of a managerial situation. The authors may have
disguised certain names and other identifying information to protect confidentiality.
Richard Ivey School of Business Foundation prohibits any form of reproduction, storage or transmission without its written
permission. Reproduction of this material is not covered under authorization by any reproduction rights organization…